Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Firewall Technology for Better Cyber Defense

July 2, 2025
northkorea
  • News
  • Premium Members Content

“Jasper Sleet”: North Korean AI-assisted threat actors

July 1, 2025
image
  • Offensive Security
  • Premium Members Content

Introducing PromptFoo: Fast, Local LLM Evaluation for Developers

July 1, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Biometric Security

June 30, 2025
unlock_membership
  • Premium Members Content

Mastering Secure Coding Practices to Protect Your Software

June 27, 2025

Editor’s Picks

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS Evolved command execution | CVE-2023-28966

April 13, 2023

NAME__________Juniper Networks Junos OS Evolved command executionPlatforms Affected:Juniper Networks Junos OS EvolvedRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Juniper Networks Junos OS Evolved could...

Read MoreRead more about Juniper Networks Junos OS Evolved command execution | CVE-2023-28966
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-28981

April 13, 2023

NAME__________Juniper Networks Junos OS and Junos OS Evolved denial of servicePlatforms Affected:Juniper Networks Junos OS 20.3 Juniper Networks Junos OS...

Read MoreRead more about Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-28981
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS information disclosure | CVE-2023-28963

April 13, 2023

NAME__________Juniper Networks Junos OS information disclosurePlatforms Affected:Juniper Networks Junos OSRisk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Juniper Networks Junos OS could allow a remote...

Read MoreRead more about Juniper Networks Junos OS information disclosure | CVE-2023-28963
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS denial of service | CVE-2023-28984

April 13, 2023

NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks QFX Series Juniper Networks Junos OS 20.2 Juniper Networks Junos OS...

Read MoreRead more about Juniper Networks Junos OS denial of service | CVE-2023-28984
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS denial of service | CVE-2023-28970

April 13, 2023

NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks Junos OSRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Juniper Networks Junos OS is vulnerable...

Read MoreRead more about Juniper Networks Junos OS denial of service | CVE-2023-28970
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS Evolved information disclosure | CVE-2023-28978

April 13, 2023

NAME__________Juniper Networks Junos OS Evolved information disclosurePlatforms Affected:Juniper Networks Junos OS EvolvedRisk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Juniper Networks Junos OS Evolved could...

Read MoreRead more about Juniper Networks Junos OS Evolved information disclosure | CVE-2023-28978
CVE-prog
  • Vulnerabilities

Jenkins Thycotic Secret Server Plugin information disclosure | CVE-2023-30518

April 13, 2023

NAME__________Jenkins Thycotic Secret Server Plugin information disclosurePlatforms Affected:Jenkins Thycotic Secret Server Plugin 1.0.2Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins Thycotic Secret Server Plugin...

Read MoreRead more about Jenkins Thycotic Secret Server Plugin information disclosure | CVE-2023-30518
CVE-prog
  • Vulnerabilities

Jenkins TurboScript Plugin security bypass | CVE-2023-30532

April 13, 2023

NAME__________Jenkins TurboScript Plugin security bypassPlatforms Affected:Jenkins TurboScript Plugin 1.3Risk Level:4.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Jenkins TurboScript Plugin could allow a remote authenticated attacker...

Read MoreRead more about Jenkins TurboScript Plugin security bypass | CVE-2023-30532
CVE-prog
  • Vulnerabilities

Jenkins Consul KV Builder Plugin information disclosure | CVE-2023-30530

April 13, 2023

NAME__________Jenkins Consul KV Builder Plugin information disclosurePlatforms Affected:Jenkins Consul KV Builder Plugin 2.0.13Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins Consul KV Builder Plugin...

Read MoreRead more about Jenkins Consul KV Builder Plugin information disclosure | CVE-2023-30530
CVE-prog
  • Vulnerabilities

Apache Sling Engine cross-site scripting | CVE-2022-45064

April 13, 2023

NAME__________Apache Sling Engine cross-site scriptingPlatforms Affected:Apache Sling EngineRisk Level:6.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Apache Sling Engine is vulnerable to cross-site scripting, caused by...

Read MoreRead more about Apache Sling Engine cross-site scripting | CVE-2022-45064
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-28967

April 13, 2023

NAME__________Juniper Networks Junos OS and Junos OS Evolved denial of servicePlatforms Affected:Juniper Networks Junos OS Juniper Networks Junos OS EvolvedRisk...

Read MoreRead more about Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-28967
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS security bypass | CVE-2023-28972

April 13, 2023

NAME__________Juniper Networks Junos OS security bypassPlatforms Affected:Juniper Networks Junos OSRisk Level:6.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Juniper Networks Junos OS could allow a local...

Read MoreRead more about Juniper Networks Junos OS security bypass | CVE-2023-28972
CVE-prog
  • Vulnerabilities

Juniper Networks Paragon Active Assurance security bypass | CVE-2023-28971

April 13, 2023

NAME__________Juniper Networks Paragon Active Assurance security bypassPlatforms Affected:Juniper Networks Paragon Active AssuranceRisk Level:7.2Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Juniper Networks Paragon Active Assurance could...

Read MoreRead more about Juniper Networks Paragon Active Assurance security bypass | CVE-2023-28971
CVE-prog
  • Vulnerabilities

Jenkins Kubernetes Plugin information disclosure | CVE-2023-30524

April 13, 2023

NAME__________Jenkins Kubernetes Plugin information disclosurePlatforms Affected:Jenkins Report Portal Plugin 0.5Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins Kubernetes Plugin could allow a remote authenticated...

Read MoreRead more about Jenkins Kubernetes Plugin information disclosure | CVE-2023-30524
CVE-prog
  • Vulnerabilities

Jenkins Report Portal Plugin cross-site request forgery | CVE-2023-30525

April 13, 2023

NAME__________Jenkins Report Portal Plugin cross-site request forgeryPlatforms Affected:Jenkins Report Portal Plugin 0.5Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Jenkins Report Portal Plugin is vulnerable...

Read MoreRead more about Jenkins Report Portal Plugin cross-site request forgery | CVE-2023-30525
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS denial of service | CVE-2023-28975

April 13, 2023

NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks Junos OSRisk Level:5.4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Juniper Networks Junos OS is vulnerable...

Read MoreRead more about Juniper Networks Junos OS denial of service | CVE-2023-28975
CVE-prog
  • Vulnerabilities

Jenkins Report Portal Plugin security bypass | CVE-2023-30526

April 13, 2023

NAME__________Jenkins Report Portal Plugin security bypassPlatforms Affected:Jenkins Report Portal Plugin 0.5Risk Level:4.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Jenkins Report Portal Plugin could allow a...

Read MoreRead more about Jenkins Report Portal Plugin security bypass | CVE-2023-30526
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS security bypass | CVE-2023-28979

April 13, 2023

NAME__________Juniper Networks Junos OS security bypassPlatforms Affected:Juniper Networks Junos OSRisk Level:4.7Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Juniper Networks Junos OS could allow a remote...

Read MoreRead more about Juniper Networks Junos OS security bypass | CVE-2023-28979
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS denial of service | CVE-2023-28959

April 13, 2023

NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks Junos OSRisk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Juniper Networks Junos OS is vulnerable...

Read MoreRead more about Juniper Networks Junos OS denial of service | CVE-2023-28959
CVE-prog
  • Vulnerabilities

Juniper Networks Junos OS denial of service | CVE-2023-28964

April 13, 2023

NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks Junos OSRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Juniper Networks Junos OS is vulnerable...

Read MoreRead more about Juniper Networks Junos OS denial of service | CVE-2023-28964
CVE-prog
  • Vulnerabilities

Jenkins Kubernetes Plugin information disclosure | CVE-2023-30513

April 13, 2023

NAME__________Jenkins Kubernetes Plugin information disclosurePlatforms Affected:Jenkins Kubernetes Plugin 3909.v1f2c633e8590Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins Kubernetes Plugin could allow a remote authenticated attacker...

Read MoreRead more about Jenkins Kubernetes Plugin information disclosure | CVE-2023-30513
CVE-prog
  • Vulnerabilities

Jenkins Thycotic DevOps Secrets Vault Plugin information disclosure | CVE-2023-30515

April 13, 2023

NAME__________Jenkins Thycotic DevOps Secrets Vault Plugin information disclosurePlatforms Affected:Jenkins Thycotic DevOps Secrets Vault Plugin 1.0.0Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Jenkins Thycotic DevOps...

Read MoreRead more about Jenkins Thycotic DevOps Secrets Vault Plugin information disclosure | CVE-2023-30515
CVE-prog
  • Vulnerabilities

Wireshark RPCoRDMA dissector denial of service | CVE-2023-1992

April 13, 2023

NAME__________Wireshark RPCoRDMA dissector denial of servicePlatforms Affected:Wireshark Wireshark 4.0.4 Wireshark Wireshark 3.6.12Risk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Wireshark is vulnerable to a...

Read MoreRead more about Wireshark RPCoRDMA dissector denial of service | CVE-2023-1992
77bc55ff83b3248db25c53bda6750134d9149cd46773bd04f880083f998489c9
  • News

ChatGPT Security: OpenAI’s Bug Bounty Program Offers Up to $20,000 Prizes

April 13, 2023

OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt to...

Read MoreRead more about ChatGPT Security: OpenAI’s Bug Bounty Program Offers Up to $20,000 Prizes

Posts pagination

Previous 1 … 2,369 2,370 2,371 2,372 2,373 2,374 2,375 … 4,199 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-6920

July 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-49029

July 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-37097

July 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6954

July 2, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-6955

July 2, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel